Suggested Topics within your search.
Suggested Topics within your search.
- Mass media 5
- Critical thinking 3
- Methodology 3
- Objectivity 3
- Psychological aspects 3
- Psychology 3
- Research 3
- Application software 2
- Classroom environment 2
- Communication in education 2
- Computer-assisted instruction 2
- Education, Elementary 2
- Educational technology 2
- Health 2
- History 2
- Inquiry-based learning 2
- Interaction analysis in education 2
- Internet in education 2
- Academic writing 1
- Agricultural machinery 1
- Alternative rock music 1
- Biochemical Phenomena 1
- Cell Physiological Phenomena 1
- Child care 1
- Children 1
- Christian rock music 1
- Clinical biochemistry 1
- College graduates 1
- College students 1
- Communication of technical information 1
-
4241
Incorporating Individual Teachings (aka Individual Contact Teaching Methods) into a Sustainable Landscaping Extension Plan of Work and Report of Accomplishments
Published 2013-11-01“… Many horticultural Extension professionals conduct numerous consulting phone calls, send e-mails, visit offices, conduct research, and visit landscapes to solve horticultural problems and concerns. …”
Get full text
Article -
4242
Analysis of the impact of financial inclusion and FinTech on youth labour force participation in the MENA region
Published 2024-12-01“…The results show that young people with higher education levels, higher incomes, mobile phones and Internet access are more likely to be included in the traditional and digital financial systems. …”
Get full text
Article -
4243
Vers une justice multi-espèces : cadre théorique, enjeux et programme de recherche pour les théories et politiques environnementales
Published 2022-03-01“…It sets out some of the theoretical approaches, key areas of exploration, and obvious challenges that come with rethinking a core plank of liberal theory and politics. First, we discuss some of the diverse scholarly fields that have influenced the emergence of multispecies justice. …”
Get full text
Article -
4244
The comparisons on wave breaking captured by non-hydrostatic model with or without turbulent dissipation
Published 2025-01-01“…The spilling and plunging breakers in surf zone are simulated by the non-hydrostatic shock-capturing model with or without turbulent dissipation/model. …”
Get full text
Article -
4245
The Effects of Knowledge Base Diversity on Cross-Industry Innovation Performance: The Moderating Role of Network Embeddedness
Published 2023-01-01“…To reveal the impact of knowledge base diversity (KBD) and network embeddedness on cross-industry innovation performance (CIP), we performed an empirical hierarchical regression analysis using patent data from the mobile phone industry. The results show the following. (1) There was an inverted U-shaped relationship between relevant KBD and CIP and a U-shaped relationship between nonrelevant KBD and CIP. (2) The effects of relevant KBD on CIP were negatively moderated by an enterprise’s structural embeddedness (SE) and relational embeddedness (RE) in the innovation network. (3) The effects of nonrelevant KBD on CIP were positively moderated by an enterprise’s SE and RE in the innovation network. …”
Get full text
Article -
4246
Mobile platform continuous authentication scheme based on gait characteristics
Published 2019-07-01“…The popularity of smart phones renders people extremely high requirements for safety.But the traditional one-time authentication method can’t continuously guarantee the security of equipment.To solve the problem,a continuous authentication scheme based on gait characteristics was proposed to realize the identification of current visitors.Moving average filtering,threshold-based useful information interception method and other operations were adopted to reduce noise interference.Template interception was used to maximize the utilization of information,and an optimal combination of time domain features and frequency domain features were proposed to reduce the storage space requirement of users’ information.Finally,the support vector machine realized the identity authentication function.Experiments show that the proposed scheme can effectively authenticate the identities of visitors.…”
Get full text
Article -
4247
Identification of positive selection signatures associated with milk and composition traits in Murciano-Granadina and Barki
Published 2024-12-01“…After quality control of the initial data using Plink software (v1.90; http://pngu.mgh.harvard.edu/purcell/plink), 43,170 SNP markers were finally entered for further analysis. …”
Get full text
Article -
4248
Perceptions and reflections of embryo donation recipients: a qualitative follow-up study
Published 2025-01-01“…This study delves deeper into this topic using a qualitative grounded theory approach to capture recipients’ experiences and perceptions regarding family-building through embryo donation.Methods This was a national qualitative study conducted via semistructured phone interviews. Interviews were self-nominated and composed of 25 open-ended questions. …”
Get full text
Article -
4249
Implementation outcomes of 1-3-7 focus investigation for malaria in a low transmission setting in Southern Province, Zambia: A mixed methods study.
Published 2025-01-01“…Reporting was faster in areas where health workers classified transmission as higher and slower in areas with poor mobile phone network coverage. The strategy was widely accepted. …”
Get full text
Article -
4250
Accuracy of Teledentistry for Diagnosis and Treatment Planning of Pediatric Patients during COVID-19 Pandemic
Published 2022-01-01“…The overall purpose of the study was to assess the diagnostic sensitivity and specificity of virtual (mobile phone teledentistry) compared with clinical examinations during COVID-19. …”
Get full text
Article -
4251
Improved completion rates and characterization of drug reactions with an intensive Chagas disease treatment program in rural Bolivia.
Published 2013-01-01“…Mid-week evaluations employed phone-based evaluations. Adherence was measured by self-report, pill counts with intentional over-distribution, and Medication Event Monitoring Systems (MEMS). …”
Get full text
Article -
4252
Intellectualized forensic technique for Android pattern locks
Published 2022-02-01“…In the field of digital forensics, how to unlock mobile devices such as phones has always been an urgent problem to overcome.As a special kind of password, pattern lock is widely used in mobile phone screen unlock and software access authorization.Existing pattern lock cracking techniques have several non-negligible disadvantages, such as poor concealment, low practicability, non-intelligence and single application scenario.Two basic threat models were abstracted from shoulder surfing, surveillance camera, and real-time forensics, and a multi-scenario side channel attack on pattern locks was proposed.Based on the data of surveillance camera or manual video, intelligent vision recognition algorithms were adopted to identify, select and track the target device and biological key points in the video dynamically.Then, discrete tracking points were integrated by spatial mapping and pruning algorithm.The denoising algorithm was used to eliminate redundancy and optimize the trajectory.Through procedures above, the original trajectory was simplified into regular polylines defined by several key turning points.Finally, the simplified pattern was compared and matched with the rules of legal pattern locks to inference and retort its actual pattern.Possible candidates will be sorted in the output according to their confidences.Results show that in the surveillance camera scenario, where the device screen is always visible, the cracking success rate of our technique is 89% for 10 attempts and 99.3% for 20 attempts.In the face-to-face scenario, where the subject consciously blocks the screen and his drawing finger, the success rate was 82% after 10 attempts and 89.3% after 20 attempts.In the surveillance camera scenario, the increase of shooting horizontal distance can significantly decrease the cracking success rate.But this effect diminishes with the increase of the number of attempts.Results show that the cracking success rate of the complex password is always higher than that of the simple password during 20 attempts, which means a complex pattern lock cannot play a better protection role if the proposed technique is applied.Shooting angle deflection within 5° has little effect on the success rate of cracking.…”
Get full text
Article -
4253
Validation Indicator Identification and Customer Ranking in Microloans: A Study at Middle East Bank in Iran
Published 2024-06-01“…Seventh, the operating system of the person's phone is not Android. Eighth, the person's phone model is not SAMSUNG or XIAOMI. …”
Get full text
Article -
4254
L’utilisation du bois dans les aménagements portuaires antiques de Narbonne/Narbo Martius (Aude)
Published 2020-12-01“…The first dykes are made up of alignments of planks supported by piles, stabilising the sand levees along the river. …”
Get full text
Article -
4255
-
4256
Some Formulae of Products of the Apostol-Bernoulli and Apostol-Euler Polynomials
Published 2012-01-01Get full text
Article -
4257
Advanced Nanomaterials and Nanotechnologies for Solar Energy
Published 2019-01-01Get full text
Article -
4258
The role played by gender, household income and age in factors contributing to consumers’ attitudes towards short message service advertisements
Published 2022-10-01“… The exponential growth in the use of mobile phones has seen companies investing heavily in mobile marketing to exploit the advertising opportunities presented by this medium. …”
Get full text
Article -
4259
Impact of the nationwide implementation of mobile number portabilityon mobile communications market
Published 2019-09-01“…China’s mobile users were taken as a research object,using the random sampling survey method and the survey way of CATI (computer-assisted telephone interviewing) to conduct research on the mobile subscribers market’s structure and impact after implementation of MNP (mobile number portability).The Markov probability transfer matrix was used to predict the market share of mobile phones in China,North China and South China after the implementation of MNP.And the inflow and outflow path model was proposed innovatively.In addition,the focus was on regional characteristics,duration of use,ARPU value and number of MNP to further analyze the concerns and reasons of MNP.The result shows that the longer duration of use,the higher the ARPU value,and the stronger the willingness to choose other operators and the northern subscribers have more willing than the southern.The conclusions provide reference for the decision-making of communication operators.…”
Get full text
Article -
4260
Xylella Fastidiosa Diseases and Their Leafhopper Vectors
Published 2004-01-01“…Strains of this bacterium are the causal agent of phony peach disease (PPD), plum leaf scald, Pierce's disease (PD) of grapes, citrus variegated chlorosis (CVC), and leaf scorch of almond, coffee, elm, oak, oleander pear, and sycamore. …”
Get full text
Article